From patchwork Wed Apr 6 13:06:12 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 5448 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4KYPsP5xsPz3x1w for ; Wed, 6 Apr 2022 13:06:17 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4KYPsP3Tcfzdm; Wed, 6 Apr 2022 13:06:17 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4KYPsP31ZLz2yd6; Wed, 6 Apr 2022 13:06:17 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4KYPsN5wNJz2xhV for ; Wed, 6 Apr 2022 13:06:16 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4KYPsN4gXhzZ5; Wed, 6 Apr 2022 13:06:16 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1649250376; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=9bCttb2W9iMmbN/54NSUIHTGR1oCc0+fpOql7if+aVw=; b=pvxyefNnZSoVBjW1Yhs6M8RqJ+UcQrz9VDCoABANlEgJ5pbesvt4eJh4mJUBwHXEsHpWnQ 1zf4hFWKU7mT6jAw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1649250376; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=9bCttb2W9iMmbN/54NSUIHTGR1oCc0+fpOql7if+aVw=; b=HPXxWUoNaIh9GsJh+Py3OZYBw4QEMMrFBwc0olI1oUb/1DO7FxqjiR2TER5sVGy6PgxDNw PZPnpWP+aQ0Hb7fGIKRSpU4f022HuUTTZqUNVtB7ziv0It1ZUgb+4uGbMRPGiN6ILSrHFa UfiF+YR70t18FtGC0B9OwLQf9X4N5tpSUzdn35l1rsdZTpWWeBl2gPdTnOC+o5SubNckk5 PpQaZpRMd5lRbeDS5EQZ+Ro94240IUF9vPoiqHkLuErar/l2Awd+abJGL1/s89WTXXCh48 opYzIoLyt8apEgJB01LooYvcdbCXmvpYxItSQVb5QGtphEaDAxTioPxhiT1+tg== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] libgcrypt: Update to version 1.10.1 Date: Wed, 6 Apr 2022 15:06:12 +0200 Message-Id: <20220406130612.4974-1-adolf.belka@ipfire.org> MIME-Version: 1.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" - Update from 1.9.4 to 1.10.1 - Update of rootfile - Changelog Noteworthy changes in version 1.10.1 (2022-03-28) [C24/A4/R1] * Bug fixes: - Fix minor memory leaks in FIPS mode. - Build fixes for MUSL libc. [rCffaef0be61] * Other: - More portable integrity check in FIPS mode. [rC9fa4c8946a,T5835] - Add X9.62 OIDs to sha256 and sha512 modules. [rC52fd2305ba] Noteworthy changes in version 1.10.0 (2022-02-01) [C24/A4/R0] * New and extended interfaces: - New control codes to check for FIPS 140-3 approved algorithms. - New control code to switch into non-FIPS mode. - New cipher modes SIV and GCM-SIV as specified by RFC-5297. - Extended cipher mode AESWRAP with padding as specified by RFC-5649. [T5752] - New set of KDF functions. - New KDF modes Argon2 and Balloon. - New functions for combining hashing and signing/verification. [T4894] * Performance: - Improved support for PowerPC architectures. - Improved ECC performance on zSeries/s390x by using accelerated scalar multiplication. - Many more assembler performance improvements for several architectures. * Bug fixes: - Fix Elgamal encryption for other implementations. [R5328,CVE-2021-40528] - Fix alignment problem on macOS. [T5440] - Check the input length of the point in ECDH. [T5423] - Fix an abort in gcry_pk_get_param for "Curve25519". [T5490] * Other features: - The control code GCRYCTL_SET_ENFORCED_FIPS_FLAG is ignored because it is useless with the FIPS 140-3 related changes. - Update of the jitter entropy RNG code. [T5523] - Simplification of the entropy gatherer when using the getentropy system call. * Interface changes relative to the 1.10.0 release: GCRYCTL_SET_DECRYPTION_TAG NEW control code. GCRYCTL_FIPS_SERVICE_INDICATOR_CIPHER NEW control code. GCRYCTL_FIPS_SERVICE_INDICATOR_KDF NEW control code. GCRYCTL_NO_FIPS_MODE = 83 NEW control code. GCRY_CIPHER_MODE_SIV NEW mode. GCRY_CIPHER_MODE_GCM_SIV NEW mode. GCRY_CIPHER_EXTENDED NEW flag. GCRY_SIV_BLOCK_LEN NEW macro. gcry_cipher_set_decryption_tag NEW macro. GCRY_KDF_ARGON2 NEW constant. GCRY_KDF_BALLOON NEW constant. GCRY_KDF_ARGON2D NEW constant. GCRY_KDF_ARGON2I NEW constant. GCRY_KDF_ARGON2ID NEW constant. gcry_kdf_hd_t NEW type. gcry_kdf_job_fn_t NEW type. gcry_kdf_dispatch_job_fn_t NEW type. gcry_kdf_wait_all_jobs_fn_t NEW type. struct gcry_kdf_thread_ops NEW struct. gcry_kdf_open NEW function. gcry_kdf_compute NEW function. gcry_kdf_final NEW function. gcry_kdf_close NEW function. gcry_pk_hash_sign NEW function. gcry_pk_hash_verify NEW function. gcry_pk_random_override_new NEW function. Signed-off-by: Adolf Belka Reviewed-by: Peter Müller --- config/rootfiles/common/libgcrypt | 2 +- lfs/libgcrypt | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/config/rootfiles/common/libgcrypt b/config/rootfiles/common/libgcrypt index 8ca5cb325..8e7f74392 100644 --- a/config/rootfiles/common/libgcrypt +++ b/config/rootfiles/common/libgcrypt @@ -6,7 +6,7 @@ #usr/lib/libgcrypt.la #usr/lib/libgcrypt.so usr/lib/libgcrypt.so.20 -usr/lib/libgcrypt.so.20.3.4 +usr/lib/libgcrypt.so.20.4.1 #usr/lib/pkgconfig/libgcrypt.pc #usr/share/aclocal/libgcrypt.m4 #usr/share/info/gcrypt.info diff --git a/lfs/libgcrypt b/lfs/libgcrypt index 04ced7775..bf81a0645 100644 --- a/lfs/libgcrypt +++ b/lfs/libgcrypt @@ -24,7 +24,7 @@ include Config -VER = 1.9.4 +VER = 1.10.1 THISAPP = libgcrypt-$(VER) DL_FILE = $(THISAPP).tar.bz2 @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = b8244bc12a68955797b0c2b474ac5c95df1014231f7180a2ffa113e3aacedc98eed60ee1e4b30b032a5fcd6a04855ae07142c223906d5db9c28328a71e014f33 +$(DL_FILE)_BLAKE2 = 46f30459891183b6d9ec18f1c7907fee0ad156c7dd75044f3db2b4d1c19dc6f30b2dfa6f85bc82adc9243aaba913e40fb6faf77d2226ca5a33897220d032437a install : $(TARGET)